Skip to content

Commit 5e2da26

Browse files
authored
Merge pull request #217536 from ElazarK/doc-improvements
cloud security updates
2 parents d4c473b + c02f9f2 commit 5e2da26

File tree

6 files changed

+43
-16
lines changed

6 files changed

+43
-16
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@
132132
href: recommendations-reference.md
133133
- name: Reference list of AWS recommendations
134134
href: recommendations-reference-aws.md
135-
- name: Reference list of attack paths
135+
- name: Reference list of attack paths and cloud security graph components
136136
href: attack-path-reference.md
137137
- name: Protect cloud workloads
138138
items:

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,25 @@
11
---
2-
title: Reference list of attack paths
2+
title: Reference list of attack paths and cloud security graph components
33
titleSuffix: Defender for Cloud
44
description: This article lists Microsoft Defender for Cloud's list of attack paths based on resource.
55
ms.topic: reference
66
ms.custom: ignite-2022
7-
ms.date: 09/21/2022
7+
ms.date: 11/08/2022
88
---
99

1010

11-
# Reference list of attack paths
11+
# Reference list of attack paths and cloud security graph components
1212

13-
This article lists the attack paths, connections and insights you might see in Microsoft Defender for Cloud. What you are shown in your environment depends on the resources you're protecting and your customized configuration.
13+
This article lists the attack paths, connections and insights you might see in Microsoft Defender for Cloud related to Defender for Cloud Security Posture Management (CSPM). What you are shown in your environment depends on the resources you're protecting and your customized configuration. You will need to [enable Defender for CSPM](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) to view your attack paths. Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
1414

1515
To learn about how to respond to these attack paths, see [Identify and remediate attack paths](how-to-manage-attack-path.md).
1616

1717
## Attack paths
1818

1919
### Azure VMs
2020

21+
Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentless.md).
22+
2123
| Attack Path Display Name | Attack Path Description |
2224
|--|--|
2325
| Internet exposed VM has high severity vulnerabilities | Virtual machine '\[MachineName]' is reachable from the internet and has high severity vulnerabilities \[RCE] |
@@ -32,6 +34,8 @@ To learn about how to respond to these attack paths, see [Identify and remediate
3234

3335
### AWS VMs
3436

37+
Prerequisite: [Enable agentless scanning](enable-vulnerability-assessment-agentless.md).
38+
3539
| Attack Path Display Name | Attack Path Description |
3640
|--|--|
3741
| Internet exposed EC2 instance has high severity vulnerabilities and high permission to an account | AWS EC2 instance '\[EC2Name]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has '\[permission]' permission to account '\[AccountName]' |
@@ -43,6 +47,8 @@ To learn about how to respond to these attack paths, see [Identify and remediate
4347

4448
### Azure data
4549

50+
Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md).
51+
4652
| Attack Path Display Name | Attack Path Description |
4753
|--|--|
4854
| Internet exposed SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM '\[SqlVirtualMachineName]' is reachable from the internet, has a local user account with commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
@@ -52,18 +58,24 @@ To learn about how to respond to these attack paths, see [Identify and remediate
5258

5359
### AWS Data
5460

61+
Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md).
62+
5563
| Attack Path Display Name | Attack Path Description |
5664
|--|--|
5765
| Internet exposed AWS S3 Bucket with sensitive data is publicly accessible | S3 bucket '\[BucketName]' with sensitive data is reachable from the internet and allows public read access without authorization required. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
5866

5967
### Azure containers
6068

69+
Prerequisite: [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer.
70+
6171
| Attack Path Display Name | Attack Path Description |
6272
|--|--|--|
6373
| Internet exposed Kubernetes pod is running a container with RCE vulnerabilities | Internet exposed Kubernetes pod '\[pod name]' in namespace '\[namespace]' is running a container '\[container name]' using image '\[image name]' which has vulnerabilities allowing remote code execution |
6474
| Kubernetes pod running on an internet exposed node uses host network is running a container with RCE vulnerabilities | Kubernetes pod '\[pod name]' in namespace '\[namespace]' with host network access enabled is exposed to the internet via the host network. The pod is running container '\[container name]' using image '\[image name]' which has vulnerabilities allowing remote code execution |
6575

66-
## Insights and connections
76+
## Cloud security graph components list
77+
78+
This section lists all of the cloud security graph components (connections & insights) that can be used in queries with the [cloud security explorer](concept-attack-path.md).
6779

6880
### Insights
6981

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,18 @@ description: Learn how to prioritize remediation of cloud misconfigurations and
44
titleSuffix: Defender for Cloud attack path.
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 09/21/2022
7+
ms.date: 11/08/2022
88
---
99

1010
# What are the cloud security graph, attack path analysis, and the cloud security explorer?
1111

12+
<iframe src="https://aka.ms/docs/player?id=36a5c440-00e6-4bd8-be1f-a27fbd007119" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
13+
1214
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
1315

14-
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
16+
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
17+
18+
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and the requiring the enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
1519

1620
## What is cloud security graph?
1721

@@ -37,8 +41,11 @@ Using the cloud security explorer, you can proactively identify security risks i
3741

3842
Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
3943

40-
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections).
44+
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the [cloud security graph components list](attack-path-reference.md#cloud-security-graph-components-list).
4145

4246
## Next steps
4347

44-
[Identify and remediate attack paths](how-to-manage-attack-path.md)
48+
- [Enable Defender CSPM on a subscription](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription)
49+
- [Identify and remediate attack paths](how-to-manage-attack-path.md)
50+
- [Enabling agentless scanning for machines](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines)
51+
- [Build a query with the cloud security explorer](how-to-manage-cloud-security-explorer.md)

articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ When you enable agentless vulnerability assessment:
3333

3434
## Enabling agentless scanning for machines
3535

36-
When you enable Defender [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Defender for Servers P2](defender-for-servers-introduction.md), agentless scanning is enabled on by default.
36+
When you enable [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Defender for Servers P2](defender-for-servers-introduction.md), agentless scanning is enabled on by default.
3737

3838
If you have Defender for Servers P2 already enabled and agentless scanning is turned off, you need to turn on agentless scanning manually.
3939

articles/defender-for-cloud/how-to-manage-attack-path.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender for Cloud
44
description: Learn how to manage your attack path analysis and build queries to locate vulnerabilities in your multicloud environment.
55
ms.topic: how-to
66
ms.custom: ignite-2022
7-
ms.date: 10/03/2022
7+
ms.date: 11/08/2022
88
---
99

1010
# Identify and remediate attack paths
@@ -20,6 +20,7 @@ You can check out the full list of [Attack path names and descriptions](attack-p
2020
| Aspect | Details |
2121
|--|--|
2222
| Release state | Preview |
23+
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
2324
| Required plans | - Defender Cloud Security Posture Management (CSPM) enabled |
2425
| Required roles and permissions: | - **Security Reader** <br> - **Security Admin** <br> - **Reader** <br> - **Contributor** <br> - **Owner** |
2526
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds (Azure, AWS) <br>:::image type="icon" source="./media/icons/no-icon.png"::: Commercial clouds (GCP) <br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet) |
@@ -34,7 +35,9 @@ On this page you can organize your attack paths based on name, environment, path
3435

3536
For each attack path you can see all of risk categories and any affected resources.
3637

37-
The potential risk categories include Credentials exposure, Compute abuse, Data exposure, Subscription/account takeover.
38+
The potential risk categories include credentials exposure, compute abuse, data exposure, subscription and account takeover.
39+
40+
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
3841

3942
## Investigate and remediate attack paths
4043

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender for Cloud
44
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
55
ms.topic: how-to
66
ms.custom: ignite-2022
7-
ms.date: 10/03/2022
7+
ms.date: 11/08/2022
88
---
99

1010
# Cloud security explorer
@@ -13,13 +13,16 @@ Defender for Cloud's contextual security capabilities assists security teams in
1313

1414
By using the cloud security explorer, you can proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
1515

16-
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
16+
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
17+
18+
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
1719

1820
## Availability
1921

2022
| Aspect | Details |
2123
|--|--|
2224
| Release state | Preview |
25+
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
2326
| Required plans | - Defender Cloud Security Posture Management (CSPM) enabled |
2427
| Required roles and permissions: | - **Security Reader** <br> - **Security Admin** <br> - **Reader** <br> - **Contributor** <br> - **Owner** |
2528
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds (Azure, AWS) <br>:::image type="icon" source="./media/icons/no-icon.png"::: Commercial clouds (GCP) <br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet) |
@@ -72,4 +75,6 @@ You can review the [full list of recommendations, insights and connections](atta
7275

7376
## Next steps
7477

75-
[Create custom security initiatives and policies](custom-security-policies.md)
78+
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md)
79+
80+
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options)

0 commit comments

Comments
 (0)